Get fresh insights, pro tips, and thought starters–only the best of posts for you.
Command and Control, or C2, is the communication channel attackers use to control compromised systems. Once malware infects a device, server, or workload, it may connect back to an attacker-controlled server to receive instructions. C2 lets attackers remotely direct compromised systems after gaining access. They may use it to maintain persistence, download additional payloads, move across systems, or prepare stolen data for exfiltration.
A C2 channel usually starts after an attacker compromises a system. The infected device “phones home” to a remote server controlled by the attacker. From there, the attacker can send instructions or receive data from the compromised system.
This communication is often designed to look normal. For example, attackers may hide C2 traffic inside common web or DNS traffic so it blends in with everyday network activity. As a result, security teams may need endpoint, network, and log visibility to spot unusual patterns.
Attackers may use different techniques to maintain communication, including:
C2 activity can turn a small infection into a larger incident. If attackers maintain a reliable control channel, they can continue issuing commands, stealing data, installing malware, or spreading across the network.
However, if security teams detect and disrupt this communication early, they can limit damage before the attack escalates. That makes C2 detection a high-priority area for security operations teams.
Organizations can reduce risk by:
The goal is to identify abnormal communication before attackers can use it to deepen access or steal data.
C2 often depends on compromised endpoints communicating with external attacker-controlled infrastructure. Hexnode XDR helps security teams detect, investigate, and respond to endpoint threats that may indicate suspicious command activity, malware behavior, or unauthorized communication.
Hexnode UEM also helps reduce exposure by keeping devices managed, compliant, and policy-aligned. Together, endpoint management and threat detection can help organizations strengthen visibility across devices that connect to business resources.
Usually, C2 refers to attacker-controlled communication used by malware or compromised systems. However, the term also exists in military and operational contexts.
Detecting C2 early can help stop attackers from sending commands, spreading malware, stealing data, or escalating a small compromise into a larger breach.